CONTENT INFORMATION PROVIDING AND REPRODUCING METHOD AND APPARATUS - Provided are a content information providing method and apparatus. Application information about application data is obtained from broadcasting data. An application resource is generated based on the application information. The application resource is added to a content item. Link information between the application resource and an audio/video (AV) resource is added to attribute information of the content item. The content information including the attribute information is provided to a content reproducing apparatus.

2010-07-22

20100185766

LOAD DISTRIBUTION APPARATUS, LOAD DISTRIBUTION METHOD, AND STORAGE MEDIUM - A load distribution apparatus includes: a control unit that refers to a load information storage unit that stores load values of a plurality of information processing apparatuses, selects an information processing apparatus with the load value smaller than a predetermined threshold from the plurality of information processing apparatuses, and determines the information processing apparatus with the load value smaller than a predetermined threshold as an allocation destination of processing requests until the load value of the information processing apparatus reaches the predetermined threshold; and a transmitting unit that transmits the processing requests to the allocation destination determined by the control unit.

2010-07-22

20100185767

Content Tracking - Disclosed is a method and a tracking system for tracking content in a mobile communication network. The method comprises maintaining predefined identifying information pertaining to content to be tracked, the identifying information being independent of user information associated with the content, intercepting a message originated from a user, comparing content of the message with said predefined identifying information, and responsive to obtaining at least partial match in said comparing, concluding that said message comprises content to be tracked.

2010-07-22

20100185768

RESOURCE ALLOCATION AND MODIFICATION USING STATISTICAL ANALYSIS - In one aspect, a computer-implemented method includes generating a workload using at least one schema defined by combinations of ranges of each of at least two attributes. The computer-implemented method also includes receiving a request to provide content. The computer-implemented method further includes provisioning the content based upon the workload.

2010-07-22

20100185769

Methods for Downloading a File to Consumer Electronic Devices via a Peer-to-peer Network - This invention relates to methods for downloading a user requested file via a peer-to-peer network, comprising the steps of: generating a second queue for containing one or more trying-to-connect peers, a third queue for containing currently-connected peers, and a forth queue for containing previously-connected peers; requesting from said servers one or more available peers, wherein said available peers having one or more blocks of said user requested file; placing said available peers in said second queue; connecting to the peers in the second queue, wherein upon successfully connecting to a peer in the second queue, placing such peer in said third queue; and downloading one or more blocks from the peers in said third queue.

2010-07-22

20100185770

PRESENCE CAPABILITIES AND PREFERENCES - Architecture for gathering and presentation to a remote user (watcher) of presence, preferences, and capabilities information of a local user (publisher). An extensible presence document is employed, as transmitted by the publisher, that contains specific information about the capabilities of the publisher endpoint and preferences that are for the publisher overall. The document is aggregated, and the aggregated capabilities are transmitted to watchers. The watchers render this information in a user experience.

2010-07-22

20100185771

System and method for hybrid communication mechanism utilizing both communication server-based and direct endpoint-to-endpoint connections - A new approach is proposed that contemplates systems and methods to support a hybrid solution that utilizes a centralized communication server as the main mechanism for communication between two clients (endpoints), but augments the server-based communication with an optional direct connection between the two clients whenever available while hiding the complexities and time spent dealing with the direct connection from the clients. The switch of the communication mode between the clients is kept transparent to them during their communication session without causing any inconvenience and/or disruption of the communication. When a direct endpoint to endpoint connection is not available the approach preserves the advantages of connecting through the intermediate communication server.

2010-07-22

20100185772

METHOD FOR IMPLEMENTING SERVICE INTERACTION IN THE IP MULTIMEDIA SUBSYSTEM - A method for implementing service interaction in the IP multimedia subsystem is disclosed in the present invention, wherein each service logic has a unique service identifier. The method comprises the following steps: (a) a Serving-Call Session Control Function (S-CSCF) sends a session initiation protocol (SIP) request message to the service capability interaction manager (SCIM) or to the application server (AS) to which a user requests for a service; (b) after the AS or SCIM has received the request and has executed this service, it inserts the service identifier of this service into the SIP request, and returns the SIP request with the service identifier to said S-CSCF. With the present invention, most of the service interaction requirements can be satisfied.

2010-07-22

20100185773

ELECTRONIC DEVICE AND BASE STATION FOR MAINTAINING A NETWORK CONNECTION - An electronic device and wireless base station for maintaining a persistent connection are provided. In an embodiment, a system includes an electronic device that connects to a web-server via a physical link that is bandwidth-constrained. The physical link also includes a wireless base station and at least one network address translation (“NAT”) router that is configured to terminate idle connections between the client and the web-server. One of the electronic device and the wireless base station is configured to send keep-alive packets to the web-server in order to reduce the likelihood of the NAT router terminating the connection. The keep-alive packets are sent on a variable basis that is intended to reduce bandwidth consumption while ensuring that the NAT router does not deem the connection idle and terminate the connection.

2010-07-22

20100185774

Control Entity and Method for Setting up a Session in a Communications Network, Subscriber Database and Communications Network - Control entity and method for setting up a session in a communications network, subscriber database and communications network The invention relates to a control entity for setting up a session in a communications network, comprising an input device for receiving a request to set up a session in the communications network, a processor unit for processing the request, and an output device for sending messages. The control entity further comprising or having access to a memory for storing information. The processor unit is arranged to determine if the request comprises a valid Communication Service Identifier, CSI, the Communication Service Identifier identifying the type of communication service of the session that is to be established over the communications network. And if the request does not comprise a valid Communication Service Identifier to execute a default CSI procedure using default CSI information stored in the memory.

2010-07-22

20100185775

METHOD AND APPARATUS FOR MANAGING MULTI-STREAMING CONTENTS AND FOR CONTROLLING OF CHANGING PLAYERS DURING PLAYBACK OF MULTI-STREAMING CONTENTS - Methods and apparatus for managing multi-streaming contents and for controlling of changing media players (media renderers) during playback of the multi-streaming contents are disclosed. An exemplary of the method of controlling for changing a media player from a first player to a second player, in a control device is disclosed. The method can include receiving multi-streaming capability from the second player, the multi-streaming capability including information about at least one of multi-streaming contents performable in the second player. The method can also include receiving streaming content information and playing status information from the first player, wherein the playing status information includes playing time information of streaming content being performed at the first player. The method can also include determining streaming content desired to be performed at the second player by comparing the multi-streaming capability of the second player with streaming content information of the first player. The method can also include generating current playing information of the streaming content that is determined to be performed at the second player, based on the playing time information. The method can also include transmitting the current playing information of the streaming content to a media server which is able to communicate with the second player.

2010-07-22

20100185776

SYSTEM AND METHOD FOR SPLICING MEDIA FILES - A method for processing media content includes receiving a request for media content and, in response to receiving the request, accessing a plurality of source files associated with the requested media content, wherein the source files comprise media content in one or more source formats. The method also includes generating one or more target files based on the plurality of source files. The target files include media content in a target format. Additionally, the method includes, generating an auxiliary file associated with the target files while generating the target files. The auxiliary file includes a plurality of content records. Each content record is associated with a portion of the media content in the target files and indicates a location of the associated portion of the media content in a particular one of the target files. The method further includes, while generating the target files, transmitting the requested media content from the plurality of target files to a client as a seamless media transmission by reading each of the content records in the auxiliary file and transmitting to the client content corresponding to each content record.

2010-07-22

20100185777

METHOD AND SYSTEM FOR TRANSMITTING AND RECEIVING DATA STREAMS - A method and system for transmitting and receiving data using a plurality of antennas are disclosed. The method of transmitting includes the steps of receiving feedback information from a receiving end, the feedback information including group selection information and weight values for the plurality of antennas, grouping the plurality of antennas into a plurality of antenna groups based on the group selection information included in the feedback information, and transmitting, to a receiving end, a plurality of data streams through the plurality of antenna groups, respectively, based on the weight values.

2010-07-22

20100185778

DUPLICATING SWITCH FOR STREAMING DATA UNITS TO A TERMINAL - Streaming to a terminal by using a duplicating switch to receive a stream of data units, using the duplicating switch to store content from the stream, using the duplicating switch to generate a second stream that incorporates the content that was stored and address information corresponding to more than one terminal whose addressing information was not part of the first stream, and using the duplicating switch to make the second stream of data units available to two or more terminals.

2010-07-22

20100185779

Methods and Apparatus to Increase the Efficiency of Simultaneous Web Object Fetching Over Long-Latency Links - The invention increases performance of HTTP over long-latency links by pre-fetching objects concurrently via aggregated and flow-controlled channels. An agent and gateway together assist a Web browser in fetching HTTP contents faster from Internet Web sites over long-latency data links. The gateway and the agent coordinate the fetching of selective embedded objects in such a way that an object is ready and available on a host platform before the resident browser requires it. The seemingly instantaneous availability of objects to a browser enables it to complete processing the object to request the next object without much wait. Without this instantaneous availability of an embedded object, a browser waits for its request and the corresponding response to traverse a long delay link.

2010-07-22

20100185780

COMMUNICATION APPARATUS, COMMUNICATION SYSTEM, PROGRAM AND COMMUNICATION METHOD - There is provided a communication apparatus including: a transmission unit which transmits data to an opposite communication apparatus; a physical band measurement unit which measures a physical band against the opposite communication apparatus; and a rate control unit which controls a transmission rate of the transmission unit within a range of the physical band when a previous transmission rate of the transmission unit is below a value of subtracting a predetermined value from the physical band and within a range of exceeding the physical band when the previous transmission rate is beyond the value of subtracting the predetermined value from the physical band.

2010-07-22

20100185781

System and Method for Measuring Clock Skew on a Network - A system and method for measuring clock skew in a network is disclosed. The method comprises sending an echo message at a periodic rate from a plurality of servers in the network to an anchor server. A reply message can be sent from the anchor server to each server that includes a remote timestamp based on the anchor server clock. The remote timestamp can be recorded at each of the servers. A send timestamp that designates a time the echo message was sent and a receive timestamp that designates a time the reply message was received at the server can then be recorded. An estimated clock time of each server may also be calculated relative to the anchor server using the send and receive timestamps. A clock skew value can be determined by subtracting the estimated clock time of each server from the remote timestamp time. Interpolation can then performed between the clock skew values over a selected portion of the period of time to enable clock skew values to be estimated over the selected portion of time.

2010-07-22

20100185782

METHOD AND SYSTEM FOR REDUCING ADDRESS SPACE FOR ALLOCATED RESOURCES IN A SHARED VIRTUALIZED I/O DEVICE - A method for reducing address space in a shared virtualized I/O device includes allocating hardware resources including variable resources and permanent resources, to one or more functions. The method also includes allocating address space for an I/O mapping of the resources in a system memory, and assigning a respective portion of that address space for each function. The method further includes assigning space within each respective portion for variable resources available for allocation to the function to which the respective portion is assigned, and further assigning space within each respective portion for a set of permanent resources that have been allocated to the function to which the respective portion is assigned. The method further includes providing a translation table having a plurality of entries, and storing within each entry of the translation table, a different internal address of a permanent resource that has been allocated to a particular function.

2010-07-22

20100185783

APPLICATION SETTING MANAGEMENT APPARATUS, AND METHOD AND PROGRAM FOR CONTROLLING SETTING MANAGEMENT APPARATUS - An application setting management apparatus provided therein is capable of managing settings that differ in accordance with the device groups even when a plurality of device groups differing in function and option from each other are included. The management apparatus is connected to a plurality of devices through a communication line, and includes a reception unit configured to receive information in regard to setting for a certain application from each of the plurality of devices through the communication line, a group processing component configured to group the plurality of devices on the basis of the received information in regard to the setting for the certain application, and a transmission unit configured to transmit information used for configuring the common setting in relation to the certain application through the communication line to a plurality of grouped devices.

2010-07-22

20100185784

AUTOMATIC ADDRESS ASSIGNMENT FOR COMMUNIATION BUS - A system comprises a plurality of electronic devices connected to a bus in operational use. For automatic address configuration of the devices, the devices are daisy-chained. In the daisy-chain, a preceding one of the devices transfers its address to a next one of the devices, and the latter determines its own address via an offset with respect to the address received.

2010-07-22

20100185785

AUTOMATIC MAPPING AND UPDATING COMPUTER SWITCHING DEVICE - The present invention relates to an automatic mapping and updating computer switch device. The computer switching device provides the compatibility between a plurality of devices and a plurality of computers, and comprises a USB Host Chip connected to the plurality of peripheral devices each containing a USB connector for sending the necessary data (USB device descriptor/report) to a plurality of USB Device Chips, thus, the computers can acquire the necessary data of the peripheral devices through the connected USB Device Chips. Whenever the computer switching device re-boots or any of the peripheral devices are plugged in/pulled out, the USB Host Chip reads the new necessary data again with the previous ones, if any differences are found, the new necessary data is send to the USB Device Chip for storage.

DYNAMIC CALL HANDLING FROM MULTIPLE ATTACHED DEVICES - Multiple peripheral devices are used for various modes of communication in a unified communication application. Employing standard or custom protocols, connected peripheral devices can be configured automatically and different modes of communication such as audio, video, data, and text, are routed to available or selected peripheral devices. Incoming communication requests can be extended to multiple peripheral devices synchronously and users enabled to switch between peripheral devices seamlessly during a communication session.

2010-07-22

20100185788

Electronic device, manual provision system having the same, and manual provision method - Disclosed is a system for providing a manual. The system includes a memory device storing the manual, a port into which the memory device is inserted, and an electronic device provided with a display unit that displays the manual if the portable memory device is connected with the port. According to the system, manuals of various electronic devices are stored in a portable memory device, and the manuals are displayed on the electronic devices after the portable memory device is connected with the electronic devices whenever the manuals are necessary, so that users may more easily locate and refer to the manuals.

2010-07-22

20100185789

DMA Engine - Disclosed herein is a method of accessing a slave device from a circuit including a central processing unit, a data transfer engine, and an interface to the slave device. In one embodiment, the method includes: executing code on the central processing unit to set up the data transfer engine to access the slave device; and based on the set-up, operating the data transfer engine to supply a read request word to a transmit buffer of the interface for transmission to the slave device, and, after return of a corresponding response word to a first-in-first-out receive buffer of the interface, to disable the first-in-first-out receive buffer from receiving any further data such that the last word therein is assured to be the response word. The method further includes using an underflow mechanism of the first-in-first-out receive buffer to determine the last word therein and hence determine the response word.

Transport Frame Structure for Retransmission in DSL - Included are embodiments for retransmission in a digital subscriber line environment. At least one embodiment of a method includes framing data into transport frames, each transport frame carrying payload data that is viewed differently according to the computing layer in which it is transported; transporting the transport frames over a first computing layer, the payload data of each transport frame corresponding to an integer number Q of elementary cells of the first computing layer, an integer number of header bytes containing information specific to the transport frame, and an integer number of padding bytes; and transporting the transport frames over a second computing layer, the payload data content of each transport frame corresponding to payload data of an integer number M of elementary cells of the second computing layer.

2010-07-22

20100185792

DATA TRANSMISSION SYSTEM USING IN COMPUTER - The invention disclosed a data transmission system, comprising a first conversion module provided on the host side, used for converting USB data into data in format which may be transmitted by a data transmission module and for converting data in format which may be transmitted by the data transmission module into USB data the data transmission module provided between the host and the monitor, used for data intercommunication between the host and the monitor, and a second conversion module provided on the monitor side, used for converting USB data into data in format which may be transmitted by the data transmission module and for converting data in format which may be transmitted by the data transmission module into USB data. Wherein, the data transmission module is a DisplayPort auxiliary channel (DisplayPort AUX CH). With the invention, the connection of the personal computer host and the monitor may be realized by using only one DisplayPort cable, thereby USB interfaces may be integrated on the monitor. The manner may reduce the complexity and cost of the computer system, and may enhance the user experience.

2010-07-22

20100185793

STORAGE DEVICE AND DATA TRANSFER METHOD FOR THE SAME - A storage device is connected to a tape library having a plurality of tapes holding data and a host device. The storage device includes a receiving section, a first determining section and a reading section. The receiving section receives a request for data held in one of the tapes from the host device. The first determining section determines whether the data requested by the host device is stored in a storage section on the basis of the request received by the receiving section. The reading section reads the data in a predetermined amount to a memory from the tape in a case where the first determining section determines that the data is not stored in the storage section. The transferring section transfers the data in the memory to the host device and writes it on the storage section.

2010-07-22

20100185794

FAILOVER AND LOAD BALANCING - Provided are techniques for static load balancing implemented in a filter driver. The filter driver determines a data quota for each of multiple data paths. The filter driver identifies a maximum number of commands for a target logical unit. The filter driver selects a data path on which to send a packet based on the data quota and the maximum number of commands. Also, provided are techniques for dynamic load balancing implemented in a filter driver. The filter driver determines a data transfer speed for each of multiple data paths. The filter driver updates a load balancing share for each of the multiple data paths based on the data transfer speed of each of the multiple data paths. The filter driver selects a data path on which to send a packet based on the load balancing share of each of the multiple data paths.

2010-07-22

20100185795

DIGITAL VIDEO/AUDIO CAPTURE DEVICE AND METHOD THEREOF - In audio/video (AV) capture, two video streaming adapters (VSAs) receive an original input video signal and a compressed input video signal respectively to generate an uncompressed video streaming and a compressed video streaming respectively. The uncompressed video streaming and the compressed video streaming are transmitted to an external device by way of time division duplex. An interlock mechanism prevents concurrent transmission of the uncompressed video streaming and the compressed video streaming, so that the loss of real-time video streaming is reduced.

KEYBOARD-MOUSE SWITCH AND SWITCHING METHOD THEREOF - A keyboard-mouse switch is disclosed. The keyboard-mouse switch mentioned above is embedded in a computer apparatus and includes an information monitoring unit, a hot-key look up table and a hot-key identification controller. The information monitoring unit receives input information generated by at least one of a keyboard and a mouse. The hot-key look up table stores at least start up hot-key information. The hot-key identification controller receives the start up hot-key information and the input information. The hot-key identification identifies whether the input information is hot-key information or not and dis/enables the input information to be transmitted to the computer apparatus according to the start up hot-key information and the hot-key information.

System and Method for Security Configuration - A system and method for accessing and identifying the security parameters of a device in an information handling system is disclosed. A device in a computer system may operate according to a defined security protocol, and multiple security protocols may exist across the devices of the system. In operation, a configuration capability is defined within the PCI Express communications protocol. This capability includes a capabilities data structure through which parameters concerning the security parameters of the device may be identified and passed to a processor.

2010-07-22

20100185800

COMMUNICATION PROTOCOL FOR SHARING MEMORY RESOURCES BETWEEN COMPONENTS OF A DEVICE - In a device, such as a cell phone, memory resource sharing is enabled between components, such as integrated circuits, each of which has memory resources. This may be accomplished by providing an interconnect between the components and constructing transaction units which are sent over the interconnect to initiate memory access operations. The approach may also be used to allow for a degree of communication between device components.

2010-07-22

20100185801

DISTRIBUTED EQUIPMENT ARBITRATION IN A PROCESS CONTROL SYSTEM - A distributed process control equipment ownership arbitration system and method for arbitrating equipment ownership conflicts are disclosed. Individual control modules representing various process control entities within a process control system define a plurality of lists or queues for storing equipment arbitration information. Requests by one process control entity to acquire ownership over another process control entity are represented by an arbitration token that represents the ownership relationship sought by the acquiring process control entity. Copies of the arbitration token are communicated between the respective control modules and stored in the various arbitration queues defined by the control modules, depending on the status of the acquisition request. Upon receiving an acquisition request from another process control entity, the control module associated with the targeted process control entity decides whether the targeted process control entity is available to be acquired by the requesting control entity based on arbitration rules that are embedded within the control module itself. Once the targeted process control entity has been acquired by another process control entity it may not be acquired by any other process control entity until it has been released by the acquiring process control entity.

2010-07-22

20100185802

SOLID STATE MEMORY FORMATTING - The present disclosure includes methods and devices for solid state drive formatting. One device embodiment includes control circuitry coupled to a number of memory arrays, wherein each memory array has multiple physical blocks of memory cells. The memory arrays are formatted by the control circuitry that is configured to write system data to the number of memory arrays, where the system data ends at a physical block boundary; and write user data to the number of memory arrays, where the user data starts at a physical block boundary.

2010-07-22

20100185803

METHOD AND APPARATUS FOR ADAPTIVE DATA CHUNK TRANSFER - A block memory device and method of transferring data to a block memory device are described. Various embodiments provide methods for transferring data to a block memory device by adaptive chunking. The data transfer method comprises receiving data in a data chunk. The data transfer method then determines that the data chunk is ready to be transferred to a block memory and transfers the data chunk to the block memory. The transfer occurs over duration, repeating the above steps until the transfer is complete. The data transfer method determines that the data chunk is ready to be transferred to the block memory based on at least in part on a duration of a previous transfer.

2010-07-22

20100185804

INFORMATION PROCESSING DEVICE THAT ACCESSES MEMORY, PROCESSOR AND MEMORY MANAGEMENT METHOD - An information processing device of an example of the invention comprises an address generation section that generates a write address indicating a write position in a nonvolatile memory so that the write position is shifted in order to suppress each number of times of overlapped writing for each position of the nonvolatile memory when a write operation to the nonvolatile memory from a processor is performed, an order generation section that generates order information indicating a generation order of the writing operation, and a write control section that stores write information to the write address, and stores the order information to the nonvolatile memory so that the order information is related to at least one of the stored write information and the write address.

2010-07-22

20100185805

Method And Apparatus For Performing Wear Leveling In Memory - The embodiment of the solution provides a method for performing wear leveling in a memory. The method includes: dividing the lifecycle of the memory which includes more than one physical blocks into at least one sampling interval; for each sampling interval, getting the first physical block by taking statistics of the degree of the wear leveling of each physical block in the memory in the current sampling interval; getting the second physical block by taking statistics of the updating times of each logical address in the current sampling interval; exchanging the logical addresses and data of the first physical block and the second physical block. The embodiment of the solution also provides an apparatus corresponding the method

2010-07-22

20100185806

CACHING SYSTEMS AND METHODS USING A SOLID STATE DISK - A system includes a control module, a location description module, and a page invalidation module. The control module is configured to write data received from a host to a storage medium, read data from the storage medium, and cache data from at least one of the host and the storage medium in a flash memory. The location description module is configured to map one of a valid and invalid state to a physical location of a subset of data in the flash memory. The page invalidation module is configured to receive a command from one of the host and the control module that includes an address corresponding to the subset and an instruction to set a state of the physical location to the invalid state. The page invalidation module is further configured to set the state of the physical location to the invalid state in response to the command.

2010-07-22

20100185807

DATA STORAGE PROCESSING METHOD, DATA SEARCHING METHOD AND DEVICES THEREOF - A data storage processing method, a data searching method, and devices thereof are provided. The data storage processing method includes: sequentially writing data to a data recording area in a flash; generating log information according to a physical address of the data in the data recording area and an identifier (ID) of the data, and sequentially writing the log information to a log area in the flash; and constructing a Bloom filter data for the log information in the log area, and sequentially writing the Bloom filter data to a log digest area in the flash. A flash storage structure including the data recording area, the log area, and the log digest area is adopted, thereby reducing the occupied storage space of the flash. In addition, since all the areas adopt a sequential storage mode, the data maintenance is quite simple.

2010-07-22

20100185808

METHODS AND SYSTEMS FOR STORING AND ACCESSING DATA IN UAS BASED FLASH-MEMORY DEVICE - Methods and systems for storing and accessing data in UAS based flash memory device are disclosed. UAS based flash memory device comprises a controller and a plurality of non-volatile memories (e.g., flash memory) it controls. Controller is configured for connecting to a UAS host via a physical layer (e.g., plug and wire based on USB 3.0) and for conducting data transfer operations via two sets of logical pipes. Controller further comprises a random-access-memory (RAM) buffer configured for enabling parallel and duplex data transfer operations through the sets of logical pipes. In addition, a Smart Storage Switch configured for connecting multiple non-volatile memory devices is included in the controller. Finally, a security module/engine/unit is provided for data security via user authentication data encryption/decryption of the device. Furthermore, the flash memory device includes an optical transceiver configured for optical connection to a host also configured with an optical transceiver.

2010-07-22

20100185809

Control System and Control Method of Virtual Memory - A control method of a virtual memory is adapted for using in a computer. The control method includes the following steps. First, a plurality of application programs executed in the computer are monitored. Second, the application programs are compared with at least a predetermined program, respectively. Third, the virtual memory of a solid state disk (SSD) is controlled to be turned on or turned off according to a comparing result. Herein, the virtual memory of the SSD is controlled to be turned on or turned off to enhance both lifetime of the SSD and operation efficiency of the computer.

2010-07-22

20100185810

IN-DRAM CYCLE-BASED LEVELIZATION - Systems and methods are provided for in-DRAM cycle-based levelization. In a multi-rank, multi-lane memory system, an in-DRAM cycle-based levelization mechanism couples to a memory device in a rank and individually controls additive write latency and/or additive read latency for the memory device. The in-DRAM levelization mechanism ensures that a distribution of relative total write or read latencies across the lanes in the rank is substantially similar to that in another rank.

2010-07-22

20100185811

Data processing system and method - A data processing system including a non-volatile memory and a processor controlling an operation of the non-volatile memory is provided. The processor transmits and receives a first type of data to and from an outside through a first path through which a first command and a first address, which are used to write/read the first data to/from the non-volatile memory, are transmitted. The processor also transmits and receives a second type of data to and from the outside through a second path different from the first path through which a second command and a second address, which are used to write/read the second data to/from the non-volatile memory, are transmitted.

2010-07-22

20100185812

NONVOLATILE MEMORY DEVICE AND CACHE READ METHOD USING THE SAME - A nonvolatile memory device includes first and second registers configured to store parameters received via an input/output (IO) unit, a microcontroller configured to control an operation of the nonvolatile memory device according to the parameter stored in the first register, and a control logic unit configured to, when a parameter is received via the IO unit while the microcontroller performs an internal operation, store the received parameter in the second register.

2010-07-22

20100185813

Virtual tape device, virtual library system, and virtual tape control method - A virtual tape control method for controlling a virtual tape device includes performing a migration process for storing data stored in a logical volume to a physical volume of a library device belonging to the virtual tape device, and automatically extracting the data stored in the logical volume on which the migration process is completed at the performing, and exporting the data to a physical volume of a library device of a sub-center via a network.

2010-07-22

20100185814

DATA COPYING METHOD AND APPARATUS IN A THIN PROVISIONED SYSTEM - Data migration includes copying between normal volumes and thin provisioned volumes. Data in a normal volume can be copied to a thin provisioned volume. Alternatively, data structures can be provided to facilitate converting a normal volume into a thin provisioned volume without actual copying of data. Copying from a thin provisioned volume to a normal volume is also disclosed.

2010-07-22

20100185815

Onboard Computer Data Storage, Access, and Caching System - A controller and memory unit for a host computer has a primary controller coupled to a parallel bus interface connectable or connected to the host computer, and by cable connections to one or more remote memory disk units, one or more secondary controllers coupled by parallel bus to the primary controller, and one or more solid-state memory modules coupled by parallel bus one-to-one with the secondary controllers. The primary controller provides read/write access to the remote memory disk units and read/write access to each of the solid-state memory modules through the associated secondary controller.

2010-07-22

20100185816

Multiple Cache Line Size - A mechanism which allows pages of flash memory to be read directly into cache. The mechanism enables different cache line sizes for different cache levels in a cache hierarchy, and optionally, multiple line size support, simultaneously or as an initialization option, in the highest level (largest/slowest) cache. Such a mechanism improves performance and reduces cost for some applications.

2010-07-22

20100185817

Methods and Systems for Implementing Transcendent Page Caching - This disclosure describes, generally, methods and systems for implementing transcendent page caching. The method includes establishing a plurality of virtual machines on a physical machine. Each of the plurality of virtual machines includes a private cache, and a portion of each of the private caches is used to create a shared cache maintained by a hypervisor. The method further includes delaying the removal of the at least one of stored memory pages, storing the at least one of stored memory pages in the shared cache, and requesting, by one of the plurality of virtual machines, the at least one of the stored memory pages from the shared cache. Further, the method includes determining that the at least one of the stored memory pages is stored in the shared cache, and transferring the at least one of the stored shared memory pages to the one of the plurality of virtual machines.

2010-07-22

20100185818

RESOURCE POOL MANAGING SYSTEM AND SIGNAL PROCESSING METHOD - A resource pool managing system and a signal processing method are provided in embodiments of the present disclosure. On the basis of the resource pool, all filters on links share one set of operation resources and cached resources. The embodiment can be adapted to support different application scenarios with unequal carrier rates while mixing modes are supported and the application scenarios with unequal carrier filter orders. The embodiment also supports each stage of filters of the supporting mode-mixing system to share one set of multiply-adding and cached resources to unify the dispatching of resources in one resource pool and maximize the utilization of resources, and supports the parameterized configuration of the links forward-backward stages, link parameter, carrier rate, and so on.

2010-07-22

20100185819

INTELLIGENT CACHE INJECTION - A first cache simultaneously broadcasts, in a single message, a request for a cache line and a request to accept a future related evicted cache line to multiple other caches. Each of the multiple other caches evaluate their occupancy to derive an occupancy value that reflects their ability to accept the future related evicted cache line. In response to receiving a requested cache line, the first cache evicts the related evicted cache line to the cache with the highest occupancy value.

2010-07-22

20100185820

PROCESSOR POWER MANAGEMENT AND METHOD - A data processing device is disclosed that includes multiple processing cores, where each core is associated with a corresponding cache. When a processing core is placed into a first sleep mode, the data processing device initiates a first phase. If any cache probes are received at the processing core during the first phase, the cache probes are serviced. At the end of the first phase, the cache corresponding to the processing core is flushed, and subsequent cache probes are not serviced at the cache. Because it does not service the subsequent cache probes, the processing core can therefore enter another sleep mode, allowing the data processing device to conserve additional power.

MULTI-READER MULTI-WRITER CIRCULAR BUFFER MEMORY - A system for managing a circular buffer memory includes a number of data writers, a number of data readers, a circular buffer memory; and logic configured to form a number of counters, form a number of temporary variables from the counters, and allow the data writers and the data readers to simultaneously access locations in the circular buffer memory determined by the temporary variables.

2010-07-22

20100185823

ENABLING HIGH-PERFORMANCE COMPUTING ON NON-DEDICATED CLUSTERS - Techniques for enabling high-performance computing are provided. The techniques include resizing a logical partition in a non-dedicated compute cluster server to enable high-performance computing, wherein a high performance computing application is executed such that the high performance computing application is configured to complete execution of each of one or more application threads at a similar instance as a slowest thread in the cluster, and wherein the non-dedicated compute cluster comprises one or more servers and the logical partition is created by partitioning one or more server resources.

2010-07-22

20100185824

METHOD AND APPARATUS FOR INCREASING AN AMOUNT OF MEMORY ON DEMAND WHEN MONITORING REMOTE MIRRORING PERFORMANCE - A method and storage system for increasing an amount of memory in a queuing area on. The storage system includes first and second storage subsystems connected to each other via a path. A primary volume in the first storage subsystem and a remote secondary volume in the second storage subsystem are mirrored and operated in the asynchronous mode. A queuing area having memory is provided in the second storage subsystem for temporarily storing data transferred to the second storage subsystem from the first storage subsystem in response to a write input/output (I/O) issued by a host to write data in the primary volume. Data temporarily stored in the memory is retrieved and stored in the remote secondary volume. An unused area of the queuing area is monitored and the memory increased if the unused area becomes less than a predetermined amount.

2010-07-22

20100185825

TRANSIENT STORAGE DEVICE CONFIGURATION SILO - A device configuration silo is arranged to be accessed as an IEEE 1667-compatible silo which exposes interfaces to a host application to make changes to the presence of one or more other silos, as well as make changes to silo configurations on a per-silo basis for data and method sharing among silos across the ACTs on a storage device such as a transient storage device. The interfaces exposed by the device configuration silo are arranged to enable an authenticated provisioner, like administrator in a corporate network environment, to perform configuration changes to silos after the storage device is released into the field through a secure provisioning mechanism. In addition, users may make configuration changes to silos at runtime in some usage scenarios, for example to enable discrete portions of functionality on a storage device, by using a secure secondary authentication mechanism that is exposed by the device configuration silo.

2010-07-22

20100185826

ACCESS KEY GENERATING APPARATUS AND INFORMATION PROCESSING APPARATUS - An access key generating apparatus includes: a bit field converting unit which converts a partial bit field into a reduced bit field having a bit width shorter than a bit width of the partial bit field; an access key retaining unit which retains a plurality of access keys to control access to a memory from peripheral devices in association with each of the peripheral devices; and an indexing unit which indexes the access keys from the access key retaining unit using an index address including the reduced bit field if the conversion of the partial bit field into the reduced bit field is successful, and indexes the access keys from the access key retaining unit using an index address including the partial bit field if the conversion of the partial bit field into the reduced bit field is unsuccessful.

2010-07-22

20100185827

REFACTORING VIRTUAL DATA STORAGE HIERARCHIES - A virtual drive data storage refactoring system includes a base drive, a plurality of virtual drives coupled to the base drive and hierachly below the base drive, wherein the virtual drives each include a plurality of data storage blocks and a virtual drive controller system. The virtual drive controller system is operable to coordinate data storage on the base drive and the plurality of virtual drives. The virtual drive controller system is operable to compute a signature for each data storage block, create a list of data content for each data storage block, wherein the list is sorted according to the signature for each data storage block, locate the signatures for each data storage block that appear on each of the virtual drives, arrange the data storage blocks on the virtual drives so that data storage blocks having data content that is the same, are located in corresponding locations on each of the virtual drives, and remove the data storage blocks having data content that is the same from each of the virtual drives to a data storage drive that is hierarchly above the virtual drives.

2010-07-22

20100185828

METHOD FOR MANAGING VOLUME GROUPS CONSIDERING STORAGE TIERS - A tiered storage system according to the present invention provides for the management of migration groups. When a migration group is defined, a reference tier position is determined and the relative tier position of each constituent logical device is determined. Movement of a migration group involves migrating data in its constituent logical devices to target logical devices. The migration group is then defined by the target devices. A virtualization system makes the transition transparent to host devices.

2010-07-22

20100185829

EXTENT CONSOLIDATION AND STORAGE GROUP ALLOCATION - Data is added to a data set to cause a growth in size of the data set, wherein the data set belongs to a storage group, and wherein the data set is comprised of extents. The data set is included into a new storage group, in response to determining that the growth in the size of the data set has caused a predetermined threshold for a size limit of the storage group to be exceeded. The extents of the data set are restructured to satisfy a predetermined condition on the extents of the data set, in response to determining that the growth in the size of the data set has caused the predetermined condition on the extents included in the data set to be not satisfied.

2010-07-22

20100185830

LOGICAL ADDRESS OFFSET - The present disclosure includes methods, devices, and systems for a logical address offset. One method embodiment includes detecting a memory unit formatting operation. Subsequently, in response to detecting the formatting operation, the method includes inspecting format information on the memory unit, calculating a logical address offset, and applying the offset to a host logical address.

2010-07-22

20100185831

SEMICONDUCTOR INTEGRATED CIRCUIT AND ADDRESS TRANSLATION METHOD - A semiconductor integrated circuit incorporating an address translation section has a micro TLB, a main TLB and a CPU. The CPU reads out, at the time of process switching, a TLB entry having a private mapping of a pre-switching process from the micro TLB, stores the read TLB entry in a corresponding TLB entry storage area in a TLB context storage section having a plurality of TLB context storage areas in each of which a TLB entry having a private mapping of each of a plurality of processes is stored as a context of a TLB, reads out a TLB entry having a private mapping of a post-switching process from the TLB context storage section, and writes the read TLB entry into the main TLB.

2010-07-22

20100185832

Data Moving Processor - A system and method for processing data is disclosed. In one embodiment, a data moving processor comprises a code memory coupled to a code fetch circuit and a decode circuit coupled to the code fetch circuit. An address stack is coupled to the decode circuit and configured to store address data. A general purpose stack is coupled to the decode circuit and configured to store other data. The data moving processor uses data from the general purpose stack to perform calculations. The data moving processor uses address data from the address stack to identify source and destination memory locations. The address data may be used to drive an address line of a memory during a read or write operation. The address stack and general purpose stack are separately controlled using bytecode.

Data Storing Method and Processor Using the Same - A data storing method applied to a processor having a pipelined processing unit is provided. The pipelined processing unit includes stages. The stages include a source operand fetch stage and a write-back stage. The method includes the following steps. Firstly, a storing instruction is fetched and decoded. Next, the storing instruction is entered to the source operand fetch stage, and whether there is a late-done instruction in the pipelined processing unit is determined. The late-done instruction not lagged behind the storing instruction generates a late-coming result before entering the write-back stage. If it is determined that there is a late-done instruction in the pipelined processing unit, then the late-coming result is fetched before the storing instruction is entered to the write-back stage. Thereafter, the storing instruction is entered to the write-back stage, and the late-coming result is stored to a target memory which the storing instruction corresponds to.

ARITHMETIC PROGRAM CONVERSION APPARATUS, ARITHMETIC PROGRAM CONVERSION METHOD, AND PROGRAM - An arithmetic-program conversion apparatus includes: a program storage section storing an arithmetic program describing a circuit by a logical expression including a plurality of input and output variables, and operators; if the expression has three input variables or more, an intermediate-variable generation section generating an intermediate variable for converting the expression into a plurality of binomials including input and output variables; if the intermediate variable is generated, an expression conversion section converting the logical expression into a plurality of binomials including a binomial for obtaining the intermediate variable and a binomial obtaining the output variable from the intermediate variable; if a plurality of binomials are generated, an expression update section updating the stored original expression; a bit-width determination section determining bit widths of the output, input, and intermediate variables of the expression; and a bit-width storage section storing the bit widths of the output, input, and intermediate variables.

2010-07-22

20100185837

Reconfigurable Logic Automata - A family of reconfigurable asynchronous logic elements that interact with their nearest neighbors permits reconfigurable implementation of circuits that are asynchronous at the bit level, rather than at the level of functional blocks. These elements pass information by means of tokens. Each cell is self-timed, and cells that are configured as interconnect perform at propagation delay speeds, so no hardware non-local connections are needed. A reconfigurable asynchronous logic element comprises a set of edges for communication with at least one neighboring cell, each edge having an input for receiving tokens from neighboring cells and an output for transferring tokens to at least one neighboring cell, circuitry configured to perform a logic operation utilizing received tokens as inputs and to produce an output token reflecting the result of the logic operation, and circuitry. A reconfigurable lattice of asynchronous logic automata comprises a plurality of reconfigurable logic automata that compute by locally passing state tokens and are reconfigured by the directed shifting of programming instructions through neighboring logic elements.

2010-07-22

20100185838

PROCESSOR ASSIGNING CONTROL SYSTEM AND METHOD - A processor assigning control system includes a first memory to store a plurality of control instructions and loading schedules, a second memory to temporarily store the plurality of control instructions and loading schedules, a real-time clock (RTC), and a main controller. The main controller includes a hardware detecting unit, a software obtaining unit, and a management unit. The RTC is configured for sending clock signal to make the hardware detecting unit detect whether a plurality of processors are in a normal state or an error state. The processor assigning control system is capable of detecting connection statues between the plurality of processor and a communication bus, and performance of the processors, to obtain and assign the control instructions to the corresponding processors to dynamically deploy the processors.

2010-07-22

20100185839

APPARATUS AND METHOD FOR SCHEDULING INSTRUCTION - An apparatus and method for scheduling an instruction are provided. The apparatus includes an analyzer configured to analyze dependency of a plurality of recurrence loops and a scheduler configured to schedule the recurrence loops based the analyzed dependencies. When scheduling a plurality of recurrence loops, the apparatus first schedules a dominant loop whose loop head has no dependency on another loop among the recurrence loops.

2010-07-22

20100185840

PROPAGATING UNOBSERVED EXCEPTIONS IN A PARALLEL SYSTEM - A method of handling an exception in a parallel system includes constructing a task object, executing a method with the task object, and catching an exception with the task object during execution of the method. The exception is propagated in response to the task object becoming inaccessible without the exception having been observed.

2010-07-22

20100185841

DETERMINING ADDRESSES OF ELECTRICAL COMPONENTS ARRANGED IN A DAISY CHAIN - In one aspect, a system includes electrical components arranged in a daisy chain that include a first electrical component disposed at a first end of the daisy chain and a second electrical component disposed at an opposite end of the daisy chain than the first end. Each of the first and second electrical components includes an input port, an output port and a common port. The input port of the first electrical component is coupled to one of a supply voltage port or ground and the common ports of the first and second electrical components are coupled to the other one of the supply voltage or the ground. An address of the second electrical component is determined before addresses of the other of the electrical components are determined, and the addresses of the electrical components determine a position of an electrical component with respect to the other of the electrical components in the daisy chain.

2010-07-22

20100185842

COMPUTER SYSTEM WITH TWO OPERATING DEVICES AND CONTROL METHOD THEREOF - A computer system includes at least a first and a second operating device and a control module. The control module sends at least one signal to a central processing unit for managing and controlling the first and the second operating device, and copying the contents of any one of the two operating devices to the other operating device, so that both of the first and second operating devices include an operating system, and the computer system can select any one of the first and second operating devices for booting the operating system and power off or power on the other non-selected operating device.

2010-07-22

20100185843

HARDWARE ENCRYPTING STORAGE DEVICE WITH PHYSICALLY SEPARABLE KEY STORAGE DEVICE - Storage devices can provide for hardware encryption and decryption of data stored by them. The hardware cryptographic functions can be applied with reference to cryptographic information of a communicationally, and physically, separable key device. Disconnection of the separable key device can render encrypted data inaccessible. Destruction of the separable key device can result in virtual destruction of the encrypted data. The cryptographic information on the separable key device can be provided by a storage device manufacturer, or by a provisioning computing device. The separable key device can be directly communicationally coupled to a provisioning computing device or it can establish a secure communication tunnel with the provisioning device through a computing device to which the separable key device is communicationally coupled. Cryptographic information can be provided by, and deleted from, the provisioning computing device prior to completion of the booting of that device.

2010-07-22

20100185844

EVASION OF POWER ON SELF TEST DURING AN OPERATING SYSTEM INITIATED REBOOT - A system and method to evade the power on self test during an operating system initiated reboot is disclosed. In one embodiment, a method for optimizing reboot process of a computer includes determining a status of a power on self test (POST) performed during a prior booting of the computer when an operating system (OS) initiated rebooting of the computer is triggered, loading information obtained during the POST of the prior booting of the computer into a basic input output system (BIOS) of the computer if the status of the POST performed during the prior booting of the computer indicates a success of the POST, and performing the rebooting of the computer using the information, wherein a subsequent POST associated with the rebooting of the computer is skipped during the rebooting of the computer.

2010-07-22

20100185845

SECURE BOOT TERMINAL, SECURE BOOT METHOD, SECURE BOOT PROGRAM, RECORDING MEDIUM, AND INTEGRATED CIRCUIT - A terminal that performs secure boot processing when booting, thereby booting reliably even if, during updating of a software module, the power is cut off or the update is otherwise interrupted. The terminal comprises a CPU, a software module storage unit, a certificate storage unit, an updating unit for updating the software module and certificate, a security device provided with a configuration information storage unit for storing the configuration information of the software module, an alternate configuration information storage unit for storing the configuration information of a software module in the configuration before the update, and a boot control unit for verifying and executing the software module by using the certificate. The terminal verifies the certificate of the software module by comparing the configuration information stored by the configuration information storage unit with the configuration information stored by the alternate configuration information storage unit.

2010-07-22

20100185846

COMPUTER PRODUCT, STORAGE DEVICE, AND FIRMWARE MANAGEMENT METHOD - According to one embodiment, an electronic apparatus includes a plurality of storage modules, a rewrite module, a start module, and a switch module. The storage modules store a plurality of firmware items, respectively. The rewrite module rewrites at least one of the firmware items other than a firmware item being executed with a new firmware item. The start module starts the electronic apparatus with one of the firmware items. The switch module switches, when abnormality is detected in the firmware item for starting the electronic apparatus, the firmware item to another firmware item to start the electronic apparatus.

2010-07-22

20100185847

Database outsourcing with access privacy - This invention introduces a new paradigm for outsourcing the transaction processing backend of a multi-client database application to an untrusted service provider. Specifically, the invention enables untrusted service providers to support transaction serialization, backup and recovery for clients, with full data confidentiality and correctness. Moreover, providers learn nothing about transactions (except their size and timing), thus achieving read and write access pattern privacy.

2010-07-22

20100185848

SECURE EXTERNAL BUFFER FOR HARD DISK DRIVE SYSTEM ON A CHIP - A system securely buffers hard disk drive data using a host side eXlusive OR (XOR) encryption engine. A host communicates with an encryption interface interposed between the host and a client. Communicatively coupled to the encryption interface is an external buffer for the collection and processing of data. A host side XOR encryption engine, using a random seed, encrypts data originating from the host and places it on the external buffer. Once collected at the buffer and ready for transmittal to the client, the encrypted data is retrieved by the encryption interface and decrypted using the same random seed. The clear data is then encrypted once again using a robust encryption means such as Advance Encryption Standard (AES) encryption by a client side device for conveyance to the client.

2010-07-22

20100185849

METHOD AND ARRANGEMENT FOR CERTIFICATE HANDLING - The present invention relates to a method and an arrangement for authentication and authorization in an access network. In an initial phase of the method according to the invention the user equipment and the security gateway exchange information on available certificate(s). If the user equipment and the security gateway lack matching certificates, the attempted authentication of the security gateway can not take place according to existing protocols and arrangements. According to the invention, if a certificate mismatch is identified, a certificate server is engaged. The certificate server, which is a separate entity from the security gateway, assists in at least part of the authentication procedure. Once the authentication is confirmed a secure tunnel can be established between the user equipment and the security gateway and payload traffic can be transferred.

2010-07-22

20100185850

METHOD AND DEVICE FOR AUTHENTICATING LEGAL NEIGHBOR IN GROUP KEY MANAGEMENT - Method and device for authenticating a legal neighbor in group key management (GKM) are disclosed. The method includes: members on a local network that needs the automatic GKM service store a group shared key and a group authentication algorithm; an authenticating member receives a first authentication value and authentication information of an authenticated member sent from the authenticated member, where the first authentication value is calculated by the authenticated member by using the group shared key and the authentication information of the authenticated member according to the group authentication algorithm; the authenticating member calculates a second authentication value by using the authentication information of the authenticated member and the group shared key according to the group authentication algorithm; the authenticating member authenticates the authenticated member as a legal neighbor when confirming that the first authentication value is the same as the second authentication value.

LOCAL AREA NETWORK ARCHITECTURE - The present disclosure provides a local area network architecture including a server, a client and a data transfer system. The server uses a first operating system and includes an encryption chip and a server memory storing the encrypted files. The encryption chip includes an encryption system having a different operating environment with the first operating system. The encryption system includes a file converting module and an encryption module. The file converting module converts files to a format only recognizable for the encryption system and unrecognizable for the first operating system. The encryption module encrypts the converted files. The client uses a second operating system and includes a client memory storing the files from the server and a decryption chip. The decryption chip uses a decryption system including a file reverting module and a file decryption module. The data transfer system transmits files from the server to the client.

2010-07-22

20100185854

MULTIPLE CONTENT PROTECTION SYSTEMS IN A FILE - Supporting a plurality of content protection systems in a single container file. The protection systems share an encryption method which is accessible from a sample encryption box in the file. Each of the protection systems stores, in a protection system header box, information for decrypting the content in accordance with the corresponding protection system. In some embodiments, separate protection system header boxes in the file correspond to each of the protection systems. By using the common encryption method and sharing encryption expressions across the protection systems, the multiple content protection systems are supported in the file without creating additional copies of the content. In some embodiments, aspects of the disclosure extend the International Organization for Standardization (ISO) base media file format to support multiple digital rights management (DRM) systems in the single container file.

2010-07-22

20100185855

Data Repository and Method for Promoting Network Storage of Data - In general, the invention features methods by which more than one client program connected to a network stores the same data item on a storage device of a data repository connected to the network. In one aspect, the method comprises encrypting the data item using a key derived from the content of the data item, determining a digital fingerprint of the data item, and storing the data item on the storage device at a location or locations associated with the digital fingerprint. In a second aspect, the method comprises determining a digital fingerprint of the data item, testing for whether the data item is already stored in the repository by comparing the digital fingerprint of the data item to the digital fingerprints of data items already in storage in the repository, and challenging a client that is attempting to deposit a data item already stored in the repository, to ascertain that the client has the full data item.

2010-07-22

20100185856

Stateless Agent - Secure and stateless data transfer between a source agent at a first computer system and a destination agent at a second computer system is provided. A first list of labels of content structures is generated at the first computer system. During a first data transfer session, the first list, authentication information, at least one object included in the content structures, and file identifiers for one or more files included in the content structures are transferred from the first computer system to the second computer system. A second list is generated at the second computer system and received at the first computer system. The second list lists at least one requested file identified by the transmitted file identifier(s). During a second data transfer session, authentication information, the first list, the at least one object, and the requested file(s) are transferred from the first computer system to the second computer system.

2010-07-22

20100185857

REMOVABLE SECURITY MODULES AND RELATED METHODS - Example removable security modules for use with process control devices and related methods are disclosed. An example removable security module includes a body configured to be removably coupled to the process control device and a memory disposed in the body with a shared secret stored in the memory. The example removable security module also includes a processing unit disposed in the body, coupled to the memory and configured to read information from the process control device, compare the information to the shared secret and authenticate the process control device based on the comparison.

2010-07-22

20100185858

Image Forming System - A Multi-Function peripheral (MFP), a server apparatus, and a client apparatus for generating image output data from document data and transmitting the image output data to the server apparatus are each connected to a network. In the server apparatus, an output data management unit stores the received image output data in an output data storage unit. Upon receiving user authentication information that is input with a user operation on the MFP, the server apparatus determines whether the user authentication information is valid. When the user authentication information is determined to be valid, the server apparatus transmits to the MFP one or more among the stored image output data associated with the user authentication information.

METHOD FOR AUTHENTICATING A COMMUNICATION CHANNEL BETWEEN A CLIENT AND A SERVER - A method for authenticating a communication channel between a client and server has been disclosed. The method employs a mutual authentication payload (MAP) protocol that enables mutual authentication between a client and server system in a convenient user-friendly manner while providing seamless and automated portability to the clients, In the process of mutual authentication, the client verifies that the server entity is indeed the intended entity and is trusted. Likewise, the server verifies if the client entity initiating the exchange is indeed the intended entity and is trusted. Accordingly, this verification process involves multi-factor authentication factors contained within the MAP protocol.

2010-07-22

20100185861

ANONYMOUS KEY ISSUING FOR ATTRIBUTE-BASED ENCRYPTION - The claimed subject matter provides systems and/or methods that establish a decryption key for use with an attribute authority. The system can include components that identify a pseudonym based a global identifier (GID) associated with a user, initiates communication with the attribute authority, and selects a first random value utilized to determine a first value. The system also includes components that select a second random value, employs the first value and the second random value to generate a second value and a third value, receives the second value and the third value, identifies a third random value, and employs the second value, the third value, the first random value, and the third random value to determine a fourth value which is employed to determine a fifth value. The fifth value is employed to derive the decryption key for use with the attribute authority.

2010-07-22

20100185862

Method and System for Encrypting JavaScript Object Notation (JSON) Messages - The confidentiality of JavaScript Object Notation (JSON) message data is secured using an encryption scheme. The encryption scheme implements a JSON encryption syntax, together with a set of processing rules for creating encrypting arbitrary data in JSON messages in a platform/language independent manner. A method for encrypting a data item in a JSON message begins by applying an encryption method and a key to the data item to generate a cipher value. A data object is then constructed that represents an encryption of the data item. The data item in the JSON message is then replaced with the data object, and the resulting modified JSON message is then output from a sending entity. At a receiving entity, information in the data object is used to re-generate the data item, which is then placed back in the original message.

2010-07-22

20100185863

METHOD AND APPARATUS FOR TIME-LAPSE CRYPTOGRAPHY - According to one aspect, provided is a construction and specification for an implementation of a new cryptographic primitive, “Time-Lapse Cryptography”, with which a sender can encrypt a message so that it is guaranteed to be revealed at an exact moment in the future, even if this revelation turns out to be undesirable to the sender. In one embodiment, a Time-Lapse Cryptography Service is provided (“the Service”) based on a network of parties. Senders encrypt their messages with this public key whose secret key is not known to anyone—not even a trusted third party—until a predefined and specific future time T+δ, at which point the secret key is constructed and published. In one example, the secret key can only be known after it is constructed. At or after that time, anyone can decrypt the cipher text using this secret key. Other embodiments describe other applications of such a service, for example, one embodiment is used in sealed bid auctions, others in insider stock sales, clinical trials, and electronic voting, among a variety of possible implementations. In one embodiment, a method for cryptographic encoding is provided, including generation of cryptographic key components by a plurality of parties, where participation of the parties is verified. A public key is constructed from a plurality of key components,

2010-07-22

20100185864

Multi-Dimensional Credentialing Using Veiled Certificates - In accordance with certain embodiments of the present disclosure, a method for creating a veiled certificate is provided. The method comprises requesting a certificate from a regulator by sending a message with a digital signature of the message signed by the owner. The message comprises an owner's veiled certificate token, the veiled certificate token comprising an encrypted version of the owner's identification data and the owner's identification public key for the certificate. The message further comprises the identification public key, the whole message being encrypted using the regulator's external public key. The certificate request is validated by verifying the sender's identity through validation of the digital signature using the owner's external public key and verifying the veiled certificate token using the individual' external public key. A veiled certificate is created by combining the veiled certificate token, identification public key and digitally signing the veiled certificate with the regulator's private key, wherein the owner's identification information is inaccessible from the veiled certificate, except to the certificate owner.